IEICE TRANSACTIONS on Information and Systems

Archive Index

Online ISSN : 1745-1361
Volume E98-D No.4  (Publication Date:2015/04/01)
[Whole issue]:PDF (36MB)
Previous | 
Next
Special Section on Information and Communication System Security―Against Cyberattacks―

pp.749-749  FOREWORD  Open Access Paper
FOREWORD
Naoto SONE  
Summary | FreeFull Text:PDF(55.5KB)

pp.750-759  INVITED PAPER  Open Access Paper
RFID Authentication with Un-Traceability and Forward Secrecy in the Partial-Distributed-Server Model
Hung-Yu CHIEN  Tzong-Chen WU  Chien-Lung HSU  
Summary | FreeFull Text:PDF(1.6MB)

pp.760-768  PAPER-Authentication
A New Approach to Identify User Authentication Methods toward SSH Dictionary Attack Detection
Akihiro SATOH  Yutaka NAKAMURA  Takeshi IKENAGA  
Summary | Full Text:PDF (537.9KB) >>Buy this Article

pp.769-774  PAPER-Data Hiding
ROI-Based Reversible Data Hiding Scheme for Medical Images with Tamper Detection
Yuling LIU  Xinxin QU  Guojiang XIN  Peng LIU  
Summary | Full Text:PDF (600.8KB) >>Buy this Article

pp.775-787  PAPER-Attack Monitoring & Detection
Client Honeypot Multiplication with High Performance and Precise Detection
Mitsuaki AKIYAMA  Takeshi YAGI  Youki KADOBAYASHI  Takeo HARIU  Suguru YAMAGUCHI  
Summary | Full Text:PDF (892.7KB) >>Buy this Article

pp.788-795  PAPER-Attack Monitoring & Detection
GHOST Sensor: A Proactive Cyber Attack Monitoring Platform
Masashi ETO  Tomohide TANAKA  Koei SUZUKI  Mio SUZUKI  Daisuke INOUE  Koji NAKAO  
Summary | Full Text:PDF (889.4KB) >>Buy this Article

pp.796-806  PAPER-Cloud Security
Efficient Data Possession Auditing for Real-World Cloud Storage Environments
Da XIAO  Lvyin YANG  Chuanyi LIU  Bin SUN  Shihui ZHENG  
Summary | Full Text:PDF (1.6MB) >>Buy this Article

pp.807-811  LETTER-Access Control
Access Control to Prevent Malicious JavaScript Code Exploiting Vulnerabilities of WebView in Android OS
Jing YU  Toshihiro YAMAUCHI  
Summary | Full Text:PDF (331.3KB) >>Buy this Article

Regular Section

pp.812-823  PAPER-Fundamentals of Information Systems
Enabling a Uniform OpenCL Device View for Heterogeneous Platforms
Dafei HUANG  Changqing XUN  Nan WU  Mei WEN  Chunyuan ZHANG  Xing CAI  Qianming YANG  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

pp.824-834  PAPER-Fundamentals of Information Systems
OBDD Representation of Intersection Graphs
Asahi TAKAOKA  Satoshi TAYU  Shuichi UENO  
Summary | Full Text:PDF (426.3KB) >>Buy this Article

pp.835-851  PAPER-Computer System
A Distributed and Cooperative NameNode Cluster for a Highly-Available Hadoop Distributed File System
Yonghwan KIM  Tadashi ARARAGI  Junya NAKAMURA  Toshimitsu MASUZAWA  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.852-862  PAPER-Software Engineering
Recovering Traceability Links between Requirements and Source Code Using the Configuration Management Log
Ryosuke TSUCHIYA  Hironori WASHIZAKI  Yoshiaki FUKAZAWA  Tadahisa KATO  Masumi KAWAKAMI  Kentaro YOSHIMURA  
Summary | Full Text:PDF (741.9KB) >>Buy this Article

pp.863-871  PAPER-Data Engineering, Web Information Systems
Authorization Conflict Problems in Combining RIF Rules with RDF Data
Jaehoon KIM  
Summary | Full Text:PDF (1.6MB) >>Buy this Article

pp.872-882  PAPER-Data Engineering, Web Information Systems
A Study of Effective Replica Reconstruction Schemes for the Hadoop Distributed File System
Asami HIGAI  Atsuko TAKEFUSA  Hidemoto NAKADA  Masato OGUCHI  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.883-893  PAPER-Information Network
An Original Entry Point Detection Method with Candidate-Sorting for More Effective Generic Unpacking
Ryoichi ISAWA  Daisuke INOUE  Koji NAKAO  
Summary | Full Text:PDF (637.9KB) >>Buy this Article

pp.894-901  PAPER-Information Network
A Sector-Based Graphical Password Scheme with Resistance to Login-Recording Attacks
Wei-Chi KU  Yu-Chang YEH  Bo-Ren CHENG  Chia-Ju CHANG  
Summary | Full Text:PDF (1.7MB) >>Buy this Article

pp.902-910  PAPER-Office Information Systems, e-Business Modeling
Social Network and Tag Sources Based Augmenting Collaborative Recommender System
Tinghuai MA  Jinjuan ZHOU  Meili TANG  Yuan TIAN  Abdullah AL-DHELAAN  Mznah AL-RODHAAN  Sungyoung LEE  
Summary | Full Text:PDF (2.1MB) >>Buy this Article

pp.911-921  PAPER-Office Information Systems, e-Business Modeling
Techniques for Measuring Business Process Based on Business Values
Jihyun LEE  Sungwon KANG  
Summary | Full Text:PDF (2MB) >>Buy this Article

pp.922-929  PAPER-Rehabilitation Engineering and Assistive Technology
Advantages and Drawbacks of Smartphones and Tablets for Visually Impaired People —— Analysis of ICT User Survey Results ——
Tetsuya WATANABE  Toshimitsu YAMAGUCHI  Kazunori MINATANI  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

pp.930-937  PAPER-Image Recognition, Computer Vision
A Spatially Correlated Mixture Model for Image Segmentation
Kosei KURISU  Nobuo SUEMATSU  Kazunori IWATA  Akira HAYASHI  
Summary | Full Text:PDF (923.1KB) >>Buy this Article

pp.938-947  PAPER-Image Recognition, Computer Vision
Robust Visual Tracking Using Sparse Discriminative Graph Embedding
Jidong ZHAO  Jingjing LI  Ke LU  
Summary | Full Text:PDF (2.4MB) >>Buy this Article

pp.948-954  PAPER-Natural Language Processing
Personalized Recommendation of Item Category Using Ranking on Time-Aware Graphs
Chen CHEN  Chunyan HOU  Peng NIE  Xiaojie YUAN  
Summary | Full Text:PDF (3.2MB) >>Buy this Article

pp.955-959  LETTER-Software Engineering
Fault Localization Using Failure-Related Contexts for Automatic Program Repair
Ang LI  Xiaoguang MAO  Yan LEI  Tao JI  
Summary | Full Text:PDF (336KB) >>Buy this Article

pp.960-963  LETTER-Data Engineering, Web Information Systems
Efficient In-Network Processing of Continuous Grouped Aggregation Queries in Sensor Networks
Inchul SONG  Yohan J. ROH  Myoung Ho KIM  
Summary | Full Text:PDF (263KB) >>Buy this Article

pp.964-967  LETTER-Information Network
Fuzzy-Based Adaptive Countering Method against False Data Injection Attacks in Wireless Sensor Networks
Hae Young LEE  
Summary | Full Text:PDF (628.2KB) >>Buy this Article

pp.968-971  LETTER-Human-computer Interaction
Supporting Jogging at an Even Pace by Synchronizing Music Playback Speed with Runner's Pace
Tetsuro KITAHARA  Shunsuke HOKARI  Tatsuya NAGAYASU  
Summary | Full Text:PDF (186.4KB) >>Buy this Article

pp.972-975  LETTER-Image Processing and Video Processing
Exemplar-Based Inpainting Driven by Feature Vectors and Region Segmentation
Jinki PARK  Jaehwa PARK  Young-Bin KWON  Chan-Gun LEE  Ho-Hyun PARK  
Summary | Full Text:PDF (658.6KB) >>Buy this Article

pp.976-979  LETTER-Image Processing and Video Processing
Removing Boundary Effect of a Patch-Based Super-Resolution Algorithm
Aram KIM  Junhee PARK  Byung-Uk LEE  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

pp.980-984  LETTER-Image Recognition, Computer Vision
Robust Superpixel Tracking with Weighted Multiple-Instance Learning
Xu CHENG  Nijun LI  Tongchi ZHOU  Lin ZHOU  Zhenyang WU  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.985-988  LETTER-Image Recognition, Computer Vision
Co-saliency Detection Linearly Combining Single-View Saliency and Foreground Correspondence
Huiyun JING  Xin HE  Qi HAN  Xiamu NIU  
Summary | Full Text:PDF (4.1MB) >>Buy this Article

pp.989-993  LETTER-Image Recognition, Computer Vision
Contextual Max Pooling for Human Action Recognition
Zhong ZHANG  Shuang LIU  Xing MEI  
Summary | Full Text:PDF (207.9KB) >>Buy this Article

pp.994-998  LETTER-Natural Language Processing
Identifying Nonlocal Dependencies in Incremental Parsing
Yoshihide KATO  Shigeki MATSUBARA  
Summary | Full Text:PDF (357.5KB) >>Buy this Article

Previous | 
Next
go to Page Top